schema_version stringclasses 1
value | event dict | identity_context dict | telemetry_stream listlengths 6 9 | vulnerability dict | detection dict | impact dict | simulation dict |
|---|---|---|---|---|---|---|---|
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103542",
"label": "fraudulent",
"label_confidence": 0.785,
"severity": "high",
"timestamp": "2026-01-03T11:02:00Z",
"trace_id": "08716bbe-bf3d-aa27-7a17-d832bbd0b4c5"
} | {
"account_age_days": 1217,
"account_id": "ACCT-C6082C1AE27E",
"baseline_risk_score": 0.305,
"kyc_tier": "tier_2",
"session_entropy": 0.275
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 388,
"timestamp": "2026-01-03T09:29:00Z",
"transaction_amount_usd": 18.63
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.814,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2859780.99,
"financial_exposure_usd": 5977211.89,
"recoverable_pct": 0.891
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109377",
"label": "benign",
"label_confidence": 0.578,
"severity": "low",
"timestamp": "2026-01-07T12:17:00Z",
"trace_id": "d5da5720-6c4a-f434-dd53-6692b67dc76b"
} | {
"account_age_days": 918,
"account_id": "ACCT-851FEB4A9860",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.685
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "PK",
"latency_ms": 289,
"timestamp": "2026-01-07T03:56:00Z",
"transaction_amount_usd": 0.18
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.693,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1165.58,
"financial_exposure_usd": 1642.94,
"recoverable_pct": 0.887
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109585",
"label": "benign",
"label_confidence": 0.708,
"severity": "low",
"timestamp": "2026-01-07T15:45:00Z",
"trace_id": "124e51b3-35da-c1f3-937b-fc157c990bb3"
} | {
"account_age_days": 1916,
"account_id": "ACCT-C88DB890D87C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.45
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 778,
"timestamp": "2026-01-07T15:45:00Z",
"transaction_amount_usd": 6411.7
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.771,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 968,
"financial_exposure_usd": 1524.84,
"recoverable_pct": 0.736
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108931",
"label": "benign",
"label_confidence": 0.588,
"severity": "high",
"timestamp": "2026-01-07T04:51:00Z",
"trace_id": "0978c09e-ba0a-832a-4841-79fba51e8c70"
} | {
"account_age_days": 970,
"account_id": "ACCT-FA9F2AE3519A",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.947
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "HK",
"latency_ms": 110,
"timestamp": "2026-01-06T16:58:00Z",
"transaction_amount_usd": 20.69
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.684,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2422.29,
"financial_exposure_usd": 5654.01,
"recoverable_pct": 0.5
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103413",
"label": "fraudulent",
"label_confidence": 0.853,
"severity": "high",
"timestamp": "2026-01-03T08:53:00Z",
"trace_id": "997b4117-592b-ce9a-ae6b-8eaffb2d5cea"
} | {
"account_age_days": 1939,
"account_id": "ACCT-797F0EFCB964",
"baseline_risk_score": 0.184,
"kyc_tier": "tier_3",
"session_entropy": 0.904
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "BR",
"latency_ms": 320,
"timestamp": "2026-01-02T23:09:00Z",
"transaction_amount_usd": 14.19
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.911,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 1, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 2045596.86,
"financial_exposure_usd": 2193785.87,
"recoverable_pct": 0.626
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100279",
"label": "fraudulent",
"label_confidence": 0.945,
"severity": "high",
"timestamp": "2026-01-01T04:39:00Z",
"trace_id": "38ac7355-f495-dd71-1802-f730e8ec6834"
} | {
"account_age_days": 715,
"account_id": "ACCT-37CCA228020F",
"baseline_risk_score": 0.554,
"kyc_tier": "tier_1",
"session_entropy": 0.237
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CH",
"latency_ms": 578,
"timestamp": "2026-01-01T04:39:00Z",
"transaction_amount_usd": 74037.15
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.646,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 760935.09,
"financial_exposure_usd": 1294410.73,
"recoverable_pct": 0.111
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105756",
"label": "fraudulent",
"label_confidence": 0.679,
"severity": "medium",
"timestamp": "2026-01-04T23:56:00Z",
"trace_id": "a27c1447-8319-f7f2-7b05-654713fec8b4"
} | {
"account_age_days": 1146,
"account_id": "ACCT-9DB1475B7B73",
"baseline_risk_score": 0.162,
"kyc_tier": "tier_1",
"session_entropy": 0.26
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "RU",
"latency_ms": 644,
"timestamp": "2026-01-04T23:56:00Z",
"transaction_amount_usd": 2056493.2
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.536,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 3570571.24,
"financial_exposure_usd": 4517917.4,
"recoverable_pct": 0.461
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104321",
"label": "fraudulent",
"label_confidence": 0.891,
"severity": "medium",
"timestamp": "2026-01-04T00:01:00Z",
"trace_id": "5c880b0e-1eac-bbb6-88ef-295022d212b8"
} | {
"account_age_days": 843,
"account_id": "ACCT-DA26034351EB",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_1",
"session_entropy": 0.716
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 214,
"timestamp": "2026-01-04T00:01:00Z",
"transaction_amount_usd": 202060.35
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.601,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3045698.71,
"financial_exposure_usd": 5017617.54,
"recoverable_pct": 0.761
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109807",
"label": "benign",
"label_confidence": 0.702,
"severity": "high",
"timestamp": "2026-01-07T19:27:00Z",
"trace_id": "028a60b9-19b9-53e8-b1e1-0a86aaf9d2a1"
} | {
"account_age_days": 1702,
"account_id": "ACCT-7DD244D1E3BE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.651
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 799,
"timestamp": "2026-01-07T19:27:00Z",
"transaction_amount_usd": 1363.75
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.739,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 676.63,
"financial_exposure_usd": 1085.98,
"recoverable_pct": 0.745
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102350",
"label": "fraudulent",
"label_confidence": 0.833,
"severity": "high",
"timestamp": "2026-01-02T15:10:00Z",
"trace_id": "a015c8c0-cc42-a4ce-5370-eda339562202"
} | {
"account_age_days": 557,
"account_id": "ACCT-562BF345E0AC",
"baseline_risk_score": 0.566,
"kyc_tier": "tier_1",
"session_entropy": 0.315
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 743,
"timestamp": "2026-01-02T15:10:00Z",
"transaction_amount_usd": 49099.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.46,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 501623.61,
"financial_exposure_usd": 776403.22,
"recoverable_pct": 0.218
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109250",
"label": "benign",
"label_confidence": 0.46,
"severity": "medium",
"timestamp": "2026-01-07T10:10:00Z",
"trace_id": "e22f9ef7-9a2e-df1b-5af2-115dc59a5d9e"
} | {
"account_age_days": 970,
"account_id": "ACCT-4DB944C75BC0",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.417
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 255,
"timestamp": "2026-01-07T10:10:00Z",
"transaction_amount_usd": 5389.36
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.695,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 399.13,
"financial_exposure_usd": 417.79,
"recoverable_pct": 0.639
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105739",
"label": "fraudulent",
"label_confidence": 0.779,
"severity": "medium",
"timestamp": "2026-01-04T23:39:00Z",
"trace_id": "a976d135-5975-470d-8aaf-12a060f1c52d"
} | {
"account_age_days": 1343,
"account_id": "ACCT-639B21FCD329",
"baseline_risk_score": 0.182,
"kyc_tier": "tier_3",
"session_entropy": 0.393
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 328,
"timestamp": "2026-01-04T23:39:00Z",
"transaction_amount_usd": 1436430.53
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.829,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 597360.76,
"financial_exposure_usd": 1364493.11,
"recoverable_pct": 0.439
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106177",
"label": "fraudulent",
"label_confidence": 0.619,
"severity": "high",
"timestamp": "2026-01-05T06:57:00Z",
"trace_id": "edc91a7d-5c71-caac-51bf-592817ae5bb3"
} | {
"account_age_days": 1306,
"account_id": "ACCT-12A73A25A179",
"baseline_risk_score": 0.299,
"kyc_tier": "tier_2",
"session_entropy": 0.108
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CN",
"latency_ms": 119,
"timestamp": "2026-01-05T06:57:00Z",
"transaction_amount_usd": 2652656.51
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.493,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3081853.98,
"financial_exposure_usd": 3910218.07,
"recoverable_pct": 0.68
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106687",
"label": "benign",
"label_confidence": 0.546,
"severity": "high",
"timestamp": "2026-01-05T15:27:00Z",
"trace_id": "8455c155-91cb-5a69-e671-2910dbe44903"
} | {
"account_age_days": 668,
"account_id": "ACCT-D7D9CB7D90FE",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.495
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "GB",
"latency_ms": 213,
"timestamp": "2026-01-05T11:13:00Z",
"transaction_amount_usd": 11.03
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.48,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 734.09,
"financial_exposure_usd": 1650.51,
"recoverable_pct": 0.725
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108368",
"label": "benign",
"label_confidence": 0.52,
"severity": "low",
"timestamp": "2026-01-06T19:28:00Z",
"trace_id": "9592d342-1356-5035-eb24-2ab4029bfa2f"
} | {
"account_age_days": 1956,
"account_id": "ACCT-F11FD5925720",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.102
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 434,
"timestamp": "2026-01-06T19:28:00Z",
"transaction_amount_usd": 4703.78
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 774.77,
"financial_exposure_usd": 1360.12,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102573",
"label": "fraudulent",
"label_confidence": 0.792,
"severity": "high",
"timestamp": "2026-01-02T18:53:00Z",
"trace_id": "005bfefc-b48b-f460-08e4-db7978412ee3"
} | {
"account_age_days": 543,
"account_id": "ACCT-BD56EA046736",
"baseline_risk_score": 0.333,
"kyc_tier": "tier_1",
"session_entropy": 0.167
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 279,
"timestamp": "2026-01-02T18:53:00Z",
"transaction_amount_usd": 45746.7
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.416,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 1, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 88404.56,
"financial_exposure_usd": 168816.15,
"recoverable_pct": 0.232
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106480",
"label": "fraudulent",
"label_confidence": 0.831,
"severity": "medium",
"timestamp": "2026-01-05T12:00:00Z",
"trace_id": "60d443c3-e323-b03e-dc31-c3541b6757a4"
} | {
"account_age_days": 63,
"account_id": "ACCT-151DF7EF62FF",
"baseline_risk_score": 0.192,
"kyc_tier": "tier_1",
"session_entropy": 0.32
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 449,
"timestamp": "2026-01-05T12:00:00Z",
"transaction_amount_usd": 353208.23
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.765,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3869435.57,
"financial_exposure_usd": 4245175.86,
"recoverable_pct": 0.964
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106936",
"label": "benign",
"label_confidence": 0.514,
"severity": "high",
"timestamp": "2026-01-05T19:36:00Z",
"trace_id": "98de0933-1994-de67-bcf0-0425aeb94109"
} | {
"account_age_days": 819,
"account_id": "ACCT-2CDE32F0FAF6",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.81
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 383,
"timestamp": "2026-01-05T18:22:00Z",
"transaction_amount_usd": 6.13
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"ge... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.498,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 431.73,
"financial_exposure_usd": 995.26,
"recoverable_pct": 0.45
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106942",
"label": "benign",
"label_confidence": 0.597,
"severity": "medium",
"timestamp": "2026-01-05T19:42:00Z",
"trace_id": "2ffc69a7-c0b4-37d3-6f60-95cc7f5cd3c7"
} | {
"account_age_days": 858,
"account_id": "ACCT-8B8604A7A89A",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_1",
"session_entropy": 0.234
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "MY",
"latency_ms": 360,
"timestamp": "2026-01-05T17:30:00Z",
"transaction_amount_usd": 13.06
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.679,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2804.73,
"financial_exposure_usd": 3602.67,
"recoverable_pct": 0.406
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104183",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "medium",
"timestamp": "2026-01-03T21:43:00Z",
"trace_id": "70720a68-e27e-95ca-b1bb-1c9baa185cac"
} | {
"account_age_days": 23,
"account_id": "ACCT-A90D2CF3E82C",
"baseline_risk_score": 0.303,
"kyc_tier": "tier_2",
"session_entropy": 0.807
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "BR",
"latency_ms": 192,
"timestamp": "2026-01-03T21:43:00Z",
"transaction_amount_usd": 2870074.61
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.4,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND poste... | {
"customer_funds_at_risk_usd": 4089977.44,
"financial_exposure_usd": 6101118.41,
"recoverable_pct": 0.42
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109471",
"label": "benign",
"label_confidence": 0.601,
"severity": "low",
"timestamp": "2026-01-07T13:51:00Z",
"trace_id": "c79f439f-43cb-9b09-d731-5af21965066d"
} | {
"account_age_days": 1710,
"account_id": "ACCT-816DE8A813DC",
"baseline_risk_score": 0.11,
"kyc_tier": "tier_2",
"session_entropy": 0.426
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "AE",
"latency_ms": 192,
"timestamp": "2026-01-07T12:37:00Z",
"transaction_amount_usd": 22.85
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.572,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2877.84,
"financial_exposure_usd": 3045.31,
"recoverable_pct": 0.95
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101833",
"label": "fraudulent",
"label_confidence": 0.916,
"severity": "high",
"timestamp": "2026-01-02T06:33:00Z",
"trace_id": "6b636d09-2bc3-2cb9-cb56-a4332f6f5383"
} | {
"account_age_days": 908,
"account_id": "ACCT-C64D7DB24260",
"baseline_risk_score": 0.647,
"kyc_tier": "tier_1",
"session_entropy": 0.552
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 393,
"timestamp": "2026-01-02T04:48:00Z",
"transaction_amount_usd": 11.38
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.532,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 650449.27,
"financial_exposure_usd": 856340.56,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102810",
"label": "fraudulent",
"label_confidence": 0.946,
"severity": "critical",
"timestamp": "2026-01-02T22:50:00Z",
"trace_id": "0bc4cd40-f503-8ab8-7637-4378544d41be"
} | {
"account_age_days": 1462,
"account_id": "ACCT-D7E90D13C475",
"baseline_risk_score": 0.611,
"kyc_tier": "tier_3",
"session_entropy": 0.616
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 1168,
"timestamp": "2026-01-02T22:50:00Z",
"transaction_amount_usd": 52516.21
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.707,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 544971.63,
"financial_exposure_usd": 958340.7,
"recoverable_pct": 0.717
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102315",
"label": "fraudulent",
"label_confidence": 0.863,
"severity": "low",
"timestamp": "2026-01-02T14:35:00Z",
"trace_id": "a3f76aca-dfc5-896f-4304-c21cded739ec"
} | {
"account_age_days": 1056,
"account_id": "ACCT-11097B105D0B",
"baseline_risk_score": 0.362,
"kyc_tier": "tier_3",
"session_entropy": 0.306
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CN",
"latency_ms": 380,
"timestamp": "2026-01-02T11:02:00Z",
"transaction_amount_usd": 21.73
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.63,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id ... | {
"customer_funds_at_risk_usd": 1133099.15,
"financial_exposure_usd": 1273951.14,
"recoverable_pct": 0.171
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106858",
"label": "benign",
"label_confidence": 0.583,
"severity": "medium",
"timestamp": "2026-01-05T18:18:00Z",
"trace_id": "10cc2750-f747-8a76-cb53-5d2dfe834889"
} | {
"account_age_days": 50,
"account_id": "ACCT-1B0C82EC6530",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.623
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 745,
"timestamp": "2026-01-05T18:18:00Z",
"transaction_amount_usd": 328.93
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.497,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 142.15,
"financial_exposure_usd": 345.62,
"recoverable_pct": 0.487
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102651",
"label": "fraudulent",
"label_confidence": 0.758,
"severity": "critical",
"timestamp": "2026-01-02T20:11:00Z",
"trace_id": "72ef5aee-6be2-d675-23ad-1438452037eb"
} | {
"account_age_days": 743,
"account_id": "ACCT-4C4614FA5CE8",
"baseline_risk_score": 0.382,
"kyc_tier": "tier_3",
"session_entropy": 0.233
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "US",
"latency_ms": 958,
"timestamp": "2026-01-02T20:11:00Z",
"transaction_amount_usd": 40829.85
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.772,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 123260.49,
"financial_exposure_usd": 138728.57,
"recoverable_pct": 0.056
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101539",
"label": "fraudulent",
"label_confidence": 0.92,
"severity": "critical",
"timestamp": "2026-01-02T01:39:00Z",
"trace_id": "d5e94c8d-3bf1-7042-d60c-82f7039455fa"
} | {
"account_age_days": 1234,
"account_id": "ACCT-165A6A56DE1F",
"baseline_risk_score": 0.294,
"kyc_tier": "tier_1",
"session_entropy": 0.138
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 135,
"timestamp": "2026-01-02T01:39:00Z",
"transaction_amount_usd": 66041.34
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.874,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 306690.22,
"financial_exposure_usd": 395560.52,
"recoverable_pct": 0.374
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103833",
"label": "fraudulent",
"label_confidence": 0.623,
"severity": "low",
"timestamp": "2026-01-03T15:53:00Z",
"trace_id": "dea489e2-5b94-9cff-4698-eb0367b29144"
} | {
"account_age_days": 1786,
"account_id": "ACCT-296B3A811D47",
"baseline_risk_score": 0.278,
"kyc_tier": "tier_3",
"session_entropy": 0.321
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 328,
"timestamp": "2026-01-03T03:43:00Z",
"transaction_amount_usd": 3.86
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.816,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 2878052.04,
"financial_exposure_usd": 3505572.4,
"recoverable_pct": 0.913
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105783",
"label": "fraudulent",
"label_confidence": 0.883,
"severity": "critical",
"timestamp": "2026-01-05T00:23:00Z",
"trace_id": "ead5d46f-6295-e0f9-1dc3-0c8ed35023aa"
} | {
"account_age_days": 1188,
"account_id": "ACCT-0FBAC16499A2",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_2",
"session_entropy": 0.251
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "PK",
"latency_ms": 817,
"timestamp": "2026-01-05T00:23:00Z",
"transaction_amount_usd": 389709.18
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.576,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1947196.41,
"financial_exposure_usd": 4066302.48,
"recoverable_pct": 0.654
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100065",
"label": "fraudulent",
"label_confidence": 0.948,
"severity": "medium",
"timestamp": "2026-01-01T01:05:00Z",
"trace_id": "cfa9026b-6a24-1f46-3af7-fa21a93e7b5b"
} | {
"account_age_days": 200,
"account_id": "ACCT-D3966F0A6B77",
"baseline_risk_score": 0.331,
"kyc_tier": "tier_1",
"session_entropy": 0.227
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 921,
"timestamp": "2026-01-01T01:05:00Z",
"transaction_amount_usd": 58041.24
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.891,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 649094.49,
"financial_exposure_usd": 700473.08,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100388",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "critical",
"timestamp": "2026-01-01T06:28:00Z",
"trace_id": "a231a9d9-fc25-c2dc-69c5-5a32ec93993b"
} | {
"account_age_days": 1733,
"account_id": "ACCT-51FD198F3C06",
"baseline_risk_score": 0.602,
"kyc_tier": "tier_3",
"session_entropy": 0.864
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 505,
"timestamp": "2026-01-01T06:28:00Z",
"transaction_amount_usd": 81614.05
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.579,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 978415.02,
"financial_exposure_usd": 1102943.88,
"recoverable_pct": 0.076
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101671",
"label": "fraudulent",
"label_confidence": 0.769,
"severity": "high",
"timestamp": "2026-01-02T03:51:00Z",
"trace_id": "e03e8e34-f33d-d3f9-778a-57560e02f508"
} | {
"account_age_days": 1607,
"account_id": "ACCT-7B6DE8DA1377",
"baseline_risk_score": 0.275,
"kyc_tier": "tier_3",
"session_entropy": 0.135
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 364,
"timestamp": "2026-01-02T03:51:00Z",
"transaction_amount_usd": 90433.42
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.925,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 222938.93,
"financial_exposure_usd": 533265.92,
"recoverable_pct": 0.252
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101276",
"label": "fraudulent",
"label_confidence": 0.944,
"severity": "critical",
"timestamp": "2026-01-01T21:16:00Z",
"trace_id": "6fd806d8-e490-af51-1657-3540df30a58c"
} | {
"account_age_days": 1455,
"account_id": "ACCT-E33989C79FF5",
"baseline_risk_score": 0.518,
"kyc_tier": "tier_3",
"session_entropy": 0.568
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 166,
"timestamp": "2026-01-01T21:16:00Z",
"transaction_amount_usd": 66446.59
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.884,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 565020.87,
"financial_exposure_usd": 734240.74,
"recoverable_pct": 0.567
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100808",
"label": "fraudulent",
"label_confidence": 0.816,
"severity": "medium",
"timestamp": "2026-01-01T13:28:00Z",
"trace_id": "d56ca7ea-e169-4577-97cf-4a07048298ff"
} | {
"account_age_days": 1514,
"account_id": "ACCT-B12BDCC3EDFC",
"baseline_risk_score": 0.632,
"kyc_tier": "tier_3",
"session_entropy": 0.903
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "LU",
"latency_ms": 140,
"timestamp": "2026-01-01T02:30:00Z",
"transaction_amount_usd": 23.59
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.544,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 239119.89,
"financial_exposure_usd": 484697.5,
"recoverable_pct": 0.222
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105123",
"label": "fraudulent",
"label_confidence": 0.762,
"severity": "high",
"timestamp": "2026-01-04T13:23:00Z",
"trace_id": "177e93ac-ede9-64e0-25f1-498efca1611a"
} | {
"account_age_days": 1798,
"account_id": "ACCT-5029A82E61E4",
"baseline_risk_score": 0.395,
"kyc_tier": "tier_2",
"session_entropy": 0.259
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 80,
"timestamp": "2026-01-04T13:23:00Z",
"transaction_amount_usd": 1940409.26
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.61,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AN... | {
"customer_funds_at_risk_usd": 813568.25,
"financial_exposure_usd": 1869193.88,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109338",
"label": "benign",
"label_confidence": 0.629,
"severity": "low",
"timestamp": "2026-01-07T11:38:00Z",
"trace_id": "176006cb-0ac9-b99d-bf2f-41e16132f127"
} | {
"account_age_days": 490,
"account_id": "ACCT-31EBBE9CAF35",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.833
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 149,
"timestamp": "2026-01-07T11:38:00Z",
"transaction_amount_usd": 13183.91
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.699,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1622.7,
"financial_exposure_usd": 1938.91,
"recoverable_pct": 0.608
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103898",
"label": "fraudulent",
"label_confidence": 0.843,
"severity": "low",
"timestamp": "2026-01-03T16:58:00Z",
"trace_id": "1007dd07-54aa-fd23-d293-cefd1ffe11d5"
} | {
"account_age_days": 1547,
"account_id": "ACCT-33E7F7A6A05A",
"baseline_risk_score": 0.098,
"kyc_tier": "tier_2",
"session_entropy": 0.185
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "VE",
"latency_ms": 366,
"timestamp": "2026-01-03T16:58:00Z",
"transaction_amount_usd": 831870.83
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.869,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 4353447.27,
"financial_exposure_usd": 6265893.7,
"recoverable_pct": 0.452
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101289",
"label": "fraudulent",
"label_confidence": 0.804,
"severity": "medium",
"timestamp": "2026-01-01T21:29:00Z",
"trace_id": "56dea7bf-a4e5-d90f-1844-4234c9ad73e0"
} | {
"account_age_days": 1739,
"account_id": "ACCT-85A9EACA8B8D",
"baseline_risk_score": 0.543,
"kyc_tier": "tier_2",
"session_entropy": 0.761
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 728,
"timestamp": "2026-01-01T21:29:00Z",
"transaction_amount_usd": 43413.02
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.408,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 630162.27,
"financial_exposure_usd": 838074.06,
"recoverable_pct": 0.11
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107819",
"label": "benign",
"label_confidence": 0.739,
"severity": "high",
"timestamp": "2026-01-06T10:19:00Z",
"trace_id": "b60afc32-4cf1-0229-ce8e-bf66e21e3aaf"
} | {
"account_age_days": 1232,
"account_id": "ACCT-322E44262844",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.663
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 635,
"timestamp": "2026-01-06T10:19:00Z",
"transaction_amount_usd": 3914.06
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.638,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2044.64,
"financial_exposure_usd": 2802.67,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103153",
"label": "fraudulent",
"label_confidence": 0.774,
"severity": "high",
"timestamp": "2026-01-03T04:33:00Z",
"trace_id": "b53032bd-9e6b-0981-5832-9730027d0b80"
} | {
"account_age_days": 608,
"account_id": "ACCT-294BA977AAE2",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_1",
"session_entropy": 0.397
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CN",
"latency_ms": 1061,
"timestamp": "2026-01-03T04:33:00Z",
"transaction_amount_usd": 102682.47
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.867,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 547270.23,
"financial_exposure_usd": 859587.28,
"recoverable_pct": 0.103
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105870",
"label": "fraudulent",
"label_confidence": 0.893,
"severity": "medium",
"timestamp": "2026-01-05T01:50:00Z",
"trace_id": "21c428fc-ce53-8773-55ee-d5a733f2b9bb"
} | {
"account_age_days": 966,
"account_id": "ACCT-8143B4E47D67",
"baseline_risk_score": 0.179,
"kyc_tier": "tier_2",
"session_entropy": 0.715
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 285,
"timestamp": "2026-01-04T16:52:00Z",
"transaction_amount_usd": 17.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.697,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2530574.66,
"financial_exposure_usd": 4864238.07,
"recoverable_pct": 0.786
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103015",
"label": "fraudulent",
"label_confidence": 0.914,
"severity": "high",
"timestamp": "2026-01-03T02:15:00Z",
"trace_id": "b0eb2fb2-f689-ee29-906a-3be3fa6b4208"
} | {
"account_age_days": 1471,
"account_id": "ACCT-FF56C76B8674",
"baseline_risk_score": 0.539,
"kyc_tier": "tier_3",
"session_entropy": 0.369
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 599,
"timestamp": "2026-01-03T02:15:00Z",
"transaction_amount_usd": 33752.63
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.434,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 356370.12,
"financial_exposure_usd": 668650.01,
"recoverable_pct": 0.84
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108518",
"label": "benign",
"label_confidence": 0.468,
"severity": "low",
"timestamp": "2026-01-06T21:58:00Z",
"trace_id": "f9f98cb4-3d35-14fb-a141-9c6504e04dc3"
} | {
"account_age_days": 55,
"account_id": "ACCT-9E1B4C13E295",
"baseline_risk_score": 0.166,
"kyc_tier": "tier_2",
"session_entropy": 0.793
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 363,
"timestamp": "2026-01-06T10:47:00Z",
"transaction_amount_usd": 17.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.628,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 1178.98,
"financial_exposure_usd": 2657.07,
"recoverable_pct": 0.488
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108647",
"label": "benign",
"label_confidence": 0.709,
"severity": "medium",
"timestamp": "2026-01-07T00:07:00Z",
"trace_id": "18751716-5678-fdfe-0fd2-a0829ca81755"
} | {
"account_age_days": 93,
"account_id": "ACCT-7B55B9793C67",
"baseline_risk_score": 0.054,
"kyc_tier": "tier_1",
"session_entropy": 0.509
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 366,
"timestamp": "2026-01-07T00:07:00Z",
"transaction_amount_usd": 5235.05
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.594,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 876.19,
"financial_exposure_usd": 1280.2,
"recoverable_pct": 0.656
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107667",
"label": "benign",
"label_confidence": 0.643,
"severity": "medium",
"timestamp": "2026-01-06T07:47:00Z",
"trace_id": "819617e7-4701-bf4d-544d-76edff0afca3"
} | {
"account_age_days": 354,
"account_id": "ACCT-3A070E5930F2",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.674
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "DE",
"latency_ms": 221,
"timestamp": "2026-01-06T02:59:00Z",
"transaction_amount_usd": 11.08
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.609,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1250.17,
"financial_exposure_usd": 2487.42,
"recoverable_pct": 0.759
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101677",
"label": "fraudulent",
"label_confidence": 0.962,
"severity": "medium",
"timestamp": "2026-01-02T03:57:00Z",
"trace_id": "b7f84bc2-7f9d-44f6-22bb-0818799ea4f0"
} | {
"account_age_days": 918,
"account_id": "ACCT-56817EDC9770",
"baseline_risk_score": 0.592,
"kyc_tier": "tier_3",
"session_entropy": 0.314
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 395,
"timestamp": "2026-01-02T03:57:00Z",
"transaction_amount_usd": 94534.82
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.737,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 266382.61,
"financial_exposure_usd": 270075.78,
"recoverable_pct": 0.658
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-103827",
"label": "fraudulent",
"label_confidence": 0.617,
"severity": "high",
"timestamp": "2026-01-03T15:47:00Z",
"trace_id": "6e052566-b146-7ae1-ed59-979de0b8f854"
} | {
"account_age_days": 1626,
"account_id": "ACCT-41E58B4A0DDB",
"baseline_risk_score": 0.194,
"kyc_tier": "tier_1",
"session_entropy": 0.735
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 190,
"timestamp": "2026-01-03T15:47:00Z",
"transaction_amount_usd": 2039680.63
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.392,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2695155.59,
"financial_exposure_usd": 3038613.2,
"recoverable_pct": 0.454
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100411",
"label": "fraudulent",
"label_confidence": 0.942,
"severity": "high",
"timestamp": "2026-01-01T06:51:00Z",
"trace_id": "c9ec979e-0ee5-76d1-969e-cc239f3ac133"
} | {
"account_age_days": 1819,
"account_id": "ACCT-8C30BB021636",
"baseline_risk_score": 0.544,
"kyc_tier": "tier_2",
"session_entropy": 0.187
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "CA",
"latency_ms": 843,
"timestamp": "2026-01-01T06:51:00Z",
"transaction_amount_usd": 6058.1
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.479,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 1169132.45,
"financial_exposure_usd": 1339928.81,
"recoverable_pct": 0.235
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105503",
"label": "fraudulent",
"label_confidence": 0.905,
"severity": "critical",
"timestamp": "2026-01-04T19:43:00Z",
"trace_id": "ab20fdbc-e0cb-8585-6c6d-9aa9a6e87786"
} | {
"account_age_days": 918,
"account_id": "ACCT-0608B13EE681",
"baseline_risk_score": 0.394,
"kyc_tier": "tier_3",
"session_entropy": 0.626
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 750,
"timestamp": "2026-01-04T19:43:00Z",
"transaction_amount_usd": 438634.06
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.409,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 7639139.59,
"financial_exposure_usd": 7707890.87,
"recoverable_pct": 0.837
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102555",
"label": "fraudulent",
"label_confidence": 0.91,
"severity": "high",
"timestamp": "2026-01-02T18:35:00Z",
"trace_id": "7f3294f7-f542-110e-c6e5-ab15bb2b2236"
} | {
"account_age_days": 1364,
"account_id": "ACCT-3AE1CF620C54",
"baseline_risk_score": 0.524,
"kyc_tier": "tier_1",
"session_entropy": 0.896
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 222,
"timestamp": "2026-01-02T12:52:00Z",
"transaction_amount_usd": 6.82
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.459,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 395334.61,
"financial_exposure_usd": 701069.54,
"recoverable_pct": 0.805
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108907",
"label": "benign",
"label_confidence": 0.669,
"severity": "medium",
"timestamp": "2026-01-07T04:27:00Z",
"trace_id": "455e72cb-6ce6-ed6e-ae22-f51ad43975c4"
} | {
"account_age_days": 725,
"account_id": "ACCT-2F252F5B4F2B",
"baseline_risk_score": 0.191,
"kyc_tier": "tier_1",
"session_entropy": 0.717
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 1182,
"timestamp": "2026-01-07T04:27:00Z",
"transaction_amount_usd": 12754.22
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.636,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 796.8,
"financial_exposure_usd": 1577.17,
"recoverable_pct": 0.734
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107208",
"label": "benign",
"label_confidence": 0.623,
"severity": "medium",
"timestamp": "2026-01-06T00:08:00Z",
"trace_id": "642f3865-d58d-2dc6-32c6-1f737afb36e9"
} | {
"account_age_days": 1133,
"account_id": "ACCT-C8AD7910FE9D",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.846
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "TH",
"latency_ms": 149,
"timestamp": "2026-01-06T00:08:00Z",
"transaction_amount_usd": 9054.24
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.458,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1661.43,
"financial_exposure_usd": 3118.07,
"recoverable_pct": 0.474
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104407",
"label": "fraudulent",
"label_confidence": 0.771,
"severity": "low",
"timestamp": "2026-01-04T01:27:00Z",
"trace_id": "ecf5eb00-4573-b05c-c321-0051a035530e"
} | {
"account_age_days": 1303,
"account_id": "ACCT-25859BF1B29C",
"baseline_risk_score": 0.281,
"kyc_tier": "tier_2",
"session_entropy": 0.245
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "KY",
"latency_ms": 287,
"timestamp": "2026-01-03T16:19:00Z",
"transaction_amount_usd": 24.87
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTE... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.521,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2813815.62,
"financial_exposure_usd": 5265909.45,
"recoverable_pct": 0.689
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102173",
"label": "fraudulent",
"label_confidence": 0.777,
"severity": "high",
"timestamp": "2026-01-02T12:13:00Z",
"trace_id": "c89bfb2c-8413-0bc0-6c6b-11b70051fcd8"
} | {
"account_age_days": 1602,
"account_id": "ACCT-772C454145DC",
"baseline_risk_score": 0.271,
"kyc_tier": "tier_1",
"session_entropy": 0.229
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "AE",
"latency_ms": 774,
"timestamp": "2026-01-02T12:13:00Z",
"transaction_amount_usd": 88770.35
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.454,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 184019.71,
"financial_exposure_usd": 402213.26,
"recoverable_pct": 0.532
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107143",
"label": "benign",
"label_confidence": 0.45,
"severity": "high",
"timestamp": "2026-01-05T23:03:00Z",
"trace_id": "d8cc39f0-1dd0-3eaf-c0fb-04774af226e4"
} | {
"account_age_days": 468,
"account_id": "ACCT-1B567D116F39",
"baseline_risk_score": 0.168,
"kyc_tier": "tier_3",
"session_entropy": 0.584
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 690,
"timestamp": "2026-01-05T23:03:00Z",
"transaction_amount_usd": 9650.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.517,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 3276.15,
"financial_exposure_usd": 4064.84,
"recoverable_pct": 0.528
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101831",
"label": "fraudulent",
"label_confidence": 0.821,
"severity": "high",
"timestamp": "2026-01-02T06:31:00Z",
"trace_id": "713f054f-f424-5ba3-8621-da0b931bfe7d"
} | {
"account_age_days": 1497,
"account_id": "ACCT-1C070B4DF320",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_1",
"session_entropy": 0.38
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 345,
"timestamp": "2026-01-02T06:31:00Z",
"transaction_amount_usd": 50059.27
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.498,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 267024.23,
"financial_exposure_usd": 504783.01,
"recoverable_pct": 0.222
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106004",
"label": "fraudulent",
"label_confidence": 0.729,
"severity": "low",
"timestamp": "2026-01-05T04:04:00Z",
"trace_id": "389dbb76-bcf5-e895-5033-3f8d255854bc"
} | {
"account_age_days": 633,
"account_id": "ACCT-433AD6D4750E",
"baseline_risk_score": 0.337,
"kyc_tier": "tier_1",
"session_entropy": 0.612
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "MY",
"latency_ms": 974,
"timestamp": "2026-01-05T04:04:00Z",
"transaction_amount_usd": 2546079.02
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.639,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 3811775.44,
"financial_exposure_usd": 4043491.6,
"recoverable_pct": 0.522
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104878",
"label": "fraudulent",
"label_confidence": 0.752,
"severity": "medium",
"timestamp": "2026-01-04T09:18:00Z",
"trace_id": "4bbdca43-911b-f0cf-cf9d-82ed27b29cf4"
} | {
"account_age_days": 67,
"account_id": "ACCT-8D9EB38C485C",
"baseline_risk_score": 0.227,
"kyc_tier": "tier_1",
"session_entropy": 0.616
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "DE",
"latency_ms": 538,
"timestamp": "2026-01-04T09:18:00Z",
"transaction_amount_usd": 821676.95
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK_... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.424,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND po... | {
"customer_funds_at_risk_usd": 2264610.09,
"financial_exposure_usd": 3682529.87,
"recoverable_pct": 0.744
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101952",
"label": "fraudulent",
"label_confidence": 0.961,
"severity": "high",
"timestamp": "2026-01-02T08:32:00Z",
"trace_id": "8bb7f9a8-bc36-d0cf-4521-a83635394502"
} | {
"account_age_days": 114,
"account_id": "ACCT-133DAAD759A3",
"baseline_risk_score": 0.375,
"kyc_tier": "tier_3",
"session_entropy": 0.535
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 209,
"timestamp": "2026-01-02T08:32:00Z",
"transaction_amount_usd": 53429.94
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.691,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVI... | {
"customer_funds_at_risk_usd": 617405.64,
"financial_exposure_usd": 940246.88,
"recoverable_pct": 0.359
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108164",
"label": "benign",
"label_confidence": 0.666,
"severity": "medium",
"timestamp": "2026-01-06T16:04:00Z",
"trace_id": "395e9014-fde4-cd8c-44d1-42071659d2d4"
} | {
"account_age_days": 490,
"account_id": "ACCT-FF13AD1FE4E2",
"baseline_risk_score": 0.197,
"kyc_tier": "tier_1",
"session_entropy": 0.884
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 257,
"timestamp": "2026-01-06T16:04:00Z",
"transaction_amount_usd": 8882.65
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.595,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 7276.11,
"financial_exposure_usd": 8796.85,
"recoverable_pct": 0.879
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109833",
"label": "benign",
"label_confidence": 0.53,
"severity": "medium",
"timestamp": "2026-01-07T19:53:00Z",
"trace_id": "5ef3b962-e1eb-e4dd-8f1c-3a85ce3d8d2e"
} | {
"account_age_days": 1097,
"account_id": "ACCT-30D361F6D54D",
"baseline_risk_score": 0.078,
"kyc_tier": "tier_3",
"session_entropy": 0.311
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 327,
"timestamp": "2026-01-07T19:53:00Z",
"transaction_amount_usd": 8428.55
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.593,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 2331.38,
"financial_exposure_usd": 3382.17,
"recoverable_pct": 0.688
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106389",
"label": "fraudulent",
"label_confidence": 0.721,
"severity": "medium",
"timestamp": "2026-01-05T10:29:00Z",
"trace_id": "1cc07b52-02c0-8fe8-a342-9b7bc80706dd"
} | {
"account_age_days": 905,
"account_id": "ACCT-56A1DD56A440",
"baseline_risk_score": 0.34,
"kyc_tier": "tier_3",
"session_entropy": 0.83
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "GB",
"latency_ms": 1048,
"timestamp": "2026-01-05T10:29:00Z",
"transaction_amount_usd": 2380409.05
},
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.405,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2678639.94,
"financial_exposure_usd": 2916570.77,
"recoverable_pct": 0.954
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101010",
"label": "fraudulent",
"label_confidence": 0.867,
"severity": "high",
"timestamp": "2026-01-01T16:50:00Z",
"trace_id": "2c612bfc-06dd-b464-94dd-71ed1d736c6d"
} | {
"account_age_days": 296,
"account_id": "ACCT-D3971D36250D",
"baseline_risk_score": 0.339,
"kyc_tier": "tier_1",
"session_entropy": 0.147
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "DE",
"latency_ms": 359,
"timestamp": "2026-01-01T16:50:00Z",
"transaction_amount_usd": 49532.15
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.78,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 810416.41,
"financial_exposure_usd": 856493.44,
"recoverable_pct": 0.686
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107511",
"label": "benign",
"label_confidence": 0.504,
"severity": "low",
"timestamp": "2026-01-06T05:11:00Z",
"trace_id": "f9c08742-7ac2-0848-83cf-6c00aad2b739"
} | {
"account_age_days": 1965,
"account_id": "ACCT-341AED3A1589",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.545
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 988,
"timestamp": "2026-01-06T05:11:00Z",
"transaction_amount_usd": 12419.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.683,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prio... | {
"customer_funds_at_risk_usd": 582.53,
"financial_exposure_usd": 598.85,
"recoverable_pct": 0.453
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102307",
"label": "fraudulent",
"label_confidence": 0.931,
"severity": "medium",
"timestamp": "2026-01-02T14:27:00Z",
"trace_id": "dca3f5ac-6b05-5192-7f77-380e366016a7"
} | {
"account_age_days": 500,
"account_id": "ACCT-F1EC8DF7B178",
"baseline_risk_score": 0.461,
"kyc_tier": "tier_2",
"session_entropy": 0.659
} | [
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "SG",
"latency_ms": 99,
"timestamp": "2026-01-02T14:27:00Z",
"transaction_amount_usd": 105842.83
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.713,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 381100.57,
"financial_exposure_usd": 703623.28,
"recoverable_pct": 0.601
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100618",
"label": "fraudulent",
"label_confidence": 0.941,
"severity": "high",
"timestamp": "2026-01-01T10:18:00Z",
"trace_id": "7b7cfb7f-0a20-cadc-cbcc-a54b65d67be4"
} | {
"account_age_days": 446,
"account_id": "ACCT-45044404FB7A",
"baseline_risk_score": 0.502,
"kyc_tier": "tier_2",
"session_entropy": 0.74
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 748,
"timestamp": "2026-01-01T10:18:00Z",
"transaction_amount_usd": 118201.24
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.942,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 500577.47,
"financial_exposure_usd": 728828.76,
"recoverable_pct": 0.298
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108357",
"label": "benign",
"label_confidence": 0.612,
"severity": "medium",
"timestamp": "2026-01-06T19:17:00Z",
"trace_id": "1a90b972-ccb0-4eef-ca86-8d1eec8f222a"
} | {
"account_age_days": 954,
"account_id": "ACCT-084A77CC0D34",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.643
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 879,
"timestamp": "2026-01-06T19:17:00Z",
"transaction_amount_usd": 9873.17
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.685,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3974.06,
"financial_exposure_usd": 5380.23,
"recoverable_pct": 0.571
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108073",
"label": "benign",
"label_confidence": 0.596,
"severity": "low",
"timestamp": "2026-01-06T14:33:00Z",
"trace_id": "7f57d8b6-4ebf-20c7-4e8d-7880e7c8c1dc"
} | {
"account_age_days": 864,
"account_id": "ACCT-2D80D34D3623",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.538
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 343,
"timestamp": "2026-01-06T14:33:00Z",
"transaction_amount_usd": 12699.82
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.503,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2908.99,
"financial_exposure_usd": 3635.92,
"recoverable_pct": 0.546
} | {
"chaos_profile": "Holiday_Season_Spike",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109109",
"label": "benign",
"label_confidence": 0.72,
"severity": "low",
"timestamp": "2026-01-07T07:49:00Z",
"trace_id": "dc60d8ab-7bca-6213-9d1f-45db01f8784a"
} | {
"account_age_days": 185,
"account_id": "ACCT-C5840131C688",
"baseline_risk_score": 0.134,
"kyc_tier": "tier_3",
"session_entropy": 0.277
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 721,
"timestamp": "2026-01-07T07:49:00Z",
"transaction_amount_usd": 1982.87
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.641,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1511.26,
"financial_exposure_usd": 3761.09,
"recoverable_pct": 0.652
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109788",
"label": "benign",
"label_confidence": 0.559,
"severity": "low",
"timestamp": "2026-01-07T19:08:00Z",
"trace_id": "6de4f61f-1df5-4562-4e9b-2f2f04b5106d"
} | {
"account_age_days": 1646,
"account_id": "ACCT-4CF7B2D82A97",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.593
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 279,
"timestamp": "2026-01-07T19:08:00Z",
"transaction_amount_usd": 12167.72
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.754,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 1, geo diversity 3",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2040.6,
"financial_exposure_usd": 2936.26,
"recoverable_pct": 0.44
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108594",
"label": "benign",
"label_confidence": 0.596,
"severity": "medium",
"timestamp": "2026-01-06T23:14:00Z",
"trace_id": "82ddddc4-99d5-7e17-92f1-8b67d08fcf27"
} | {
"account_age_days": 472,
"account_id": "ACCT-1B8DD99183D5",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.855
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1182,
"timestamp": "2026-01-06T23:14:00Z",
"transaction_amount_usd": 5010.55
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.554,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2419.86,
"financial_exposure_usd": 4228.48,
"recoverable_pct": 0.499
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100036",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-01T00:36:00Z",
"trace_id": "95fbe976-ae00-7b7e-2f8c-83e56e8d9644"
} | {
"account_age_days": 1018,
"account_id": "ACCT-3F2086C2F1B8",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_3",
"session_entropy": 0.713
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 248,
"timestamp": "2026-01-01T00:36:00Z",
"transaction_amount_usd": 92774
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.467,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 506020.65,
"financial_exposure_usd": 1051375.97,
"recoverable_pct": 0.006
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107654",
"label": "benign",
"label_confidence": 0.649,
"severity": "low",
"timestamp": "2026-01-06T07:34:00Z",
"trace_id": "24c61d86-b259-cbe6-0a06-b595daba3584"
} | {
"account_age_days": 434,
"account_id": "ACCT-DDEC0A49760D",
"baseline_risk_score": 0.136,
"kyc_tier": "tier_3",
"session_entropy": 0.686
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "VN",
"latency_ms": 864,
"timestamp": "2026-01-06T07:34:00Z",
"transaction_amount_usd": 795.35
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.492,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1414.68,
"financial_exposure_usd": 2558.74,
"recoverable_pct": 0.754
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104298",
"label": "fraudulent",
"label_confidence": 0.93,
"severity": "medium",
"timestamp": "2026-01-03T23:38:00Z",
"trace_id": "f42a9d1c-4e5e-b79d-806e-5eadfc47fad7"
} | {
"account_age_days": 1595,
"account_id": "ACCT-8BA64AFB23C8",
"baseline_risk_score": 0.292,
"kyc_tier": "tier_1",
"session_entropy": 0.281
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "HK",
"latency_ms": 970,
"timestamp": "2026-01-03T23:38:00Z",
"transaction_amount_usd": 1629013.88
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.555,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND ... | {
"customer_funds_at_risk_usd": 1139446.68,
"financial_exposure_usd": 2515485.18,
"recoverable_pct": 0.77
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101007",
"label": "fraudulent",
"label_confidence": 0.856,
"severity": "critical",
"timestamp": "2026-01-01T16:47:00Z",
"trace_id": "b908e8e1-8a19-3470-4bbc-9914f824fdd3"
} | {
"account_age_days": 1939,
"account_id": "ACCT-B5AEBE64CFC8",
"baseline_risk_score": 0.645,
"kyc_tier": "tier_1",
"session_entropy": 0.431
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "VE",
"latency_ms": 546,
"timestamp": "2026-01-01T16:47:00Z",
"transaction_amount_usd": 71739.66
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.454,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVIN... | {
"customer_funds_at_risk_usd": 305342.4,
"financial_exposure_usd": 555236.27,
"recoverable_pct": 0.402
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107584",
"label": "benign",
"label_confidence": 0.711,
"severity": "low",
"timestamp": "2026-01-06T06:24:00Z",
"trace_id": "7184fede-c335-5a3f-fca7-e53a412028ee"
} | {
"account_age_days": 277,
"account_id": "ACCT-0A684B1CC17C",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.876
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "ES",
"latency_ms": 297,
"timestamp": "2026-01-06T06:24:00Z",
"transaction_amount_usd": 6102.99
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.655,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 3528.57,
"financial_exposure_usd": 4886.61,
"recoverable_pct": 0.564
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109206",
"label": "benign",
"label_confidence": 0.649,
"severity": "low",
"timestamp": "2026-01-07T09:26:00Z",
"trace_id": "996801e0-50b0-45a5-86ec-24d06a7b8c4e"
} | {
"account_age_days": 892,
"account_id": "ACCT-8062DE1F6804",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.215
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 1153,
"timestamp": "2026-01-07T09:26:00Z",
"transaction_amount_usd": 8129.14
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.74,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 916.03,
"financial_exposure_usd": 1235.92,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-100459",
"label": "fraudulent",
"label_confidence": 0.97,
"severity": "critical",
"timestamp": "2026-01-01T07:39:00Z",
"trace_id": "d244bf37-ee00-9943-2363-ffd7f645fab6"
} | {
"account_age_days": 32,
"account_id": "ACCT-BB7FD088AD4F",
"baseline_risk_score": 0.489,
"kyc_tier": "tier_2",
"session_entropy": 0.742
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 757,
"timestamp": "2026-01-01T07:39:00Z",
"transaction_amount_usd": 38149.79
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.368,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 617799.43,
"financial_exposure_usd": 1337168.08,
"recoverable_pct": 0.131
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102514",
"label": "fraudulent",
"label_confidence": 0.868,
"severity": "critical",
"timestamp": "2026-01-02T17:54:00Z",
"trace_id": "8999c1a7-e704-5814-0495-24c7d1d391ae"
} | {
"account_age_days": 1718,
"account_id": "ACCT-651A6123FF70",
"baseline_risk_score": 0.486,
"kyc_tier": "tier_2",
"session_entropy": 0.249
} | [
{
"asset": "USD",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "NG",
"latency_ms": 539,
"timestamp": "2026-01-02T17:54:00Z",
"transaction_amount_usd": 81223.99
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.516,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 328978.28,
"financial_exposure_usd": 473387.07,
"recoverable_pct": 0.171
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-107507",
"label": "benign",
"label_confidence": 0.736,
"severity": "low",
"timestamp": "2026-01-06T05:07:00Z",
"trace_id": "14395814-a566-694a-b4bb-dea097ac6c3b"
} | {
"account_age_days": 983,
"account_id": "ACCT-F61B4292F247",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_1",
"session_entropy": 0.728
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 397,
"timestamp": "2026-01-06T05:07:00Z",
"transaction_amount_usd": 3858.86
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.549,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 5",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 1531.01,
"financial_exposure_usd": 2203.97,
"recoverable_pct": 0.422
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108816",
"label": "benign",
"label_confidence": 0.495,
"severity": "high",
"timestamp": "2026-01-07T02:56:00Z",
"trace_id": "570ad63c-adae-7acb-4add-2483ba18c924"
} | {
"account_age_days": 519,
"account_id": "ACCT-2DC587FBD842",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.949
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "GR",
"latency_ms": 1112,
"timestamp": "2026-01-07T02:56:00Z",
"transaction_amount_usd": 568.47
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.653,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 210.04,
"financial_exposure_usd": 512.21,
"recoverable_pct": 0.996
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101958",
"label": "fraudulent",
"label_confidence": 0.807,
"severity": "high",
"timestamp": "2026-01-02T08:38:00Z",
"trace_id": "91dfa536-719f-1fd5-7617-d7b883e2e009"
} | {
"account_age_days": 975,
"account_id": "ACCT-42D8790565DE",
"baseline_risk_score": 0.519,
"kyc_tier": "tier_2",
"session_entropy": 0.539
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "KY",
"latency_ms": 880,
"timestamp": "2026-01-02T08:38:00Z",
"transaction_amount_usd": 53654.23
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.498,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 615761.06,
"financial_exposure_usd": 731945.42,
"recoverable_pct": 0.61
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105578",
"label": "fraudulent",
"label_confidence": 0.899,
"severity": "critical",
"timestamp": "2026-01-04T20:58:00Z",
"trace_id": "79f75c0e-651f-d35f-67f1-907a0458be84"
} | {
"account_age_days": 658,
"account_id": "ACCT-F07A0E8D339C",
"baseline_risk_score": 0.181,
"kyc_tier": "tier_1",
"session_entropy": 0.623
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "NL",
"latency_ms": 1106,
"timestamp": "2026-01-04T20:58:00Z",
"transaction_amount_usd": 2726635.74
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.701,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 6190715.28,
"financial_exposure_usd": 7034224.29,
"recoverable_pct": 0.6
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101954",
"label": "fraudulent",
"label_confidence": 0.844,
"severity": "medium",
"timestamp": "2026-01-02T08:34:00Z",
"trace_id": "8422d22e-7d77-2ac3-ecae-a20bf9c727db"
} | {
"account_age_days": 16,
"account_id": "ACCT-CC7987D427EA",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_3",
"session_entropy": 0.209
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 509,
"timestamp": "2026-01-02T08:34:00Z",
"transaction_amount_usd": 46938.86
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "geo_anomaly",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.578,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 4",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 591133.35,
"financial_exposure_usd": 1182138.02,
"recoverable_pct": 0.695
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109709",
"label": "benign",
"label_confidence": 0.626,
"severity": "high",
"timestamp": "2026-01-07T17:49:00Z",
"trace_id": "c7935700-8c36-d1ef-93bd-0c61cd90ab93"
} | {
"account_age_days": 536,
"account_id": "ACCT-984DB67992A3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.391
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "JP",
"latency_ms": 152,
"timestamp": "2026-01-07T17:49:00Z",
"transaction_amount_usd": 7744.44
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.772,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 4",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 3968.38,
"financial_exposure_usd": 4087.16,
"recoverable_pct": 0.915
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109850",
"label": "benign",
"label_confidence": 0.709,
"severity": "medium",
"timestamp": "2026-01-07T20:10:00Z",
"trace_id": "7f541bf6-d1cf-de6c-7875-d1d53ec4a430"
} | {
"account_age_days": 798,
"account_id": "ACCT-12B4B8E64B49",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_2",
"session_entropy": 0.581
} | [
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "IT",
"latency_ms": 491,
"timestamp": "2026-01-07T20:10:00Z",
"transaction_amount_usd": 950.32
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.483,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 5",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 1072.21,
"financial_exposure_usd": 2540.63,
"recoverable_pct": 0.942
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105134",
"label": "fraudulent",
"label_confidence": 0.692,
"severity": "high",
"timestamp": "2026-01-04T13:34:00Z",
"trace_id": "6ce51eeb-681b-adb0-9150-59e0d0bdbdf1"
} | {
"account_age_days": 931,
"account_id": "ACCT-46FBC08FDF19",
"baseline_risk_score": 0.133,
"kyc_tier": "tier_3",
"session_entropy": 0.756
} | [
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "CH",
"latency_ms": 305,
"timestamp": "2026-01-04T13:34:00Z",
"transaction_amount_usd": 1129357.14
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.447,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 5796940.88,
"financial_exposure_usd": 7446005.14,
"recoverable_pct": 0.535
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105982",
"label": "fraudulent",
"label_confidence": 0.615,
"severity": "low",
"timestamp": "2026-01-05T03:42:00Z",
"trace_id": "05c9efd0-c936-2753-ac8e-100b586cb884"
} | {
"account_age_days": 1073,
"account_id": "ACCT-74C6906135C6",
"baseline_risk_score": 0.37,
"kyc_tier": "tier_2",
"session_entropy": 0.329
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 306,
"timestamp": "2026-01-04T20:50:00Z",
"transaction_amount_usd": 17.81
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "session_hijack",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.855,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 7",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 1167185.96,
"financial_exposure_usd": 1626948.64,
"recoverable_pct": 0.504
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102619",
"label": "fraudulent",
"label_confidence": 0.753,
"severity": "high",
"timestamp": "2026-01-02T19:39:00Z",
"trace_id": "1cda5c0d-b7ef-2bb1-103b-bf9853b4065d"
} | {
"account_age_days": 1255,
"account_id": "ACCT-41EFD9CE266C",
"baseline_risk_score": 0.595,
"kyc_tier": "tier_2",
"session_entropy": 0.789
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "PK",
"latency_ms": 632,
"timestamp": "2026-01-02T19:39:00Z",
"transaction_amount_usd": 60347.41
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.56,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HAVING... | {
"customer_funds_at_risk_usd": 127058.47,
"financial_exposure_usd": 139423.19,
"recoverable_pct": 0.638
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102449",
"label": "fraudulent",
"label_confidence": 0.879,
"severity": "high",
"timestamp": "2026-01-02T16:49:00Z",
"trace_id": "44f4970f-dcf2-3c22-3f4a-c53dfeeed4b2"
} | {
"account_age_days": 165,
"account_id": "ACCT-84A5A75E4FB8",
"baseline_risk_score": 0.515,
"kyc_tier": "tier_1",
"session_entropy": 0.52
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "NG",
"latency_ms": 350,
"timestamp": "2026-01-02T14:14:00Z",
"transaction_amount_usd": 9.19
},
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.578,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 4, geo diversity 5",
"confidence_band": "medium",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id HA... | {
"customer_funds_at_risk_usd": 431223.67,
"financial_exposure_usd": 726130.31,
"recoverable_pct": 0.146
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105990",
"label": "fraudulent",
"label_confidence": 0.873,
"severity": "high",
"timestamp": "2026-01-05T03:50:00Z",
"trace_id": "f5c26c82-d4c1-65a5-c27b-e1f536e7e1f3"
} | {
"account_age_days": 852,
"account_id": "ACCT-C198116BF208",
"baseline_risk_score": 0.298,
"kyc_tier": "tier_1",
"session_entropy": 0.1
} | [
{
"asset": "GBP",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "SG",
"latency_ms": 751,
"timestamp": "2026-01-05T03:50:00Z",
"transaction_amount_usd": 1463686.94
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.372,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 4",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3251787.12,
"financial_exposure_usd": 3547820.51,
"recoverable_pct": 0.852
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-102643",
"label": "fraudulent",
"label_confidence": 0.934,
"severity": "high",
"timestamp": "2026-01-02T20:03:00Z",
"trace_id": "ee2fdae4-6134-9cd1-8c4b-dd07802a3995"
} | {
"account_age_days": 1428,
"account_id": "ACCT-9C767066E56F",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_2",
"session_entropy": 0.321
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "JP",
"latency_ms": 172,
"timestamp": "2026-01-02T08:07:00Z",
"transaction_amount_usd": 19.64
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"... | {
"exposure_vector": "session_hijack",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.376,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 698047.35,
"financial_exposure_usd": 938141.67,
"recoverable_pct": 0.425
} | {
"chaos_profile": "Calm_Baseline",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105024",
"label": "fraudulent",
"label_confidence": 0.839,
"severity": "high",
"timestamp": "2026-01-04T11:44:00Z",
"trace_id": "5c3a6819-6204-0ccd-0a56-fedb5d83edad"
} | {
"account_age_days": 1361,
"account_id": "ACCT-4B04EF52963F",
"baseline_risk_score": 0.399,
"kyc_tier": "tier_2",
"session_entropy": 0.219
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "JP",
"latency_ms": 1018,
"timestamp": "2026-01-04T11:44:00Z",
"transaction_amount_usd": 1571266.92
},
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "ORDER_BOO... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.609,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 4, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 3589129.05,
"financial_exposure_usd": 7475297.17,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109599",
"label": "benign",
"label_confidence": 0.637,
"severity": "medium",
"timestamp": "2026-01-07T15:59:00Z",
"trace_id": "4f524975-5b3f-ec0d-a8c9-90d6dd39869b"
} | {
"account_age_days": 1201,
"account_id": "ACCT-46EA94FCFA72",
"baseline_risk_score": 0.076,
"kyc_tier": "tier_2",
"session_entropy": 0.643
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "PT",
"latency_ms": 517,
"timestamp": "2026-01-07T15:59:00Z",
"transaction_amount_usd": 9608.69
},
{
"asset": "USD",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.676,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 3, geo diversity 4",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_t... | {
"customer_funds_at_risk_usd": 2378.56,
"financial_exposure_usd": 2703.88,
"recoverable_pct": 0.53
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-106632",
"label": "fraudulent",
"label_confidence": 0.766,
"severity": "low",
"timestamp": "2026-01-05T14:32:00Z",
"trace_id": "48785740-59d4-d69e-0a01-149b0e0c1333"
} | {
"account_age_days": 70,
"account_id": "ACCT-5F95EDDE5065",
"baseline_risk_score": 0.287,
"kyc_tier": "tier_1",
"session_entropy": 0.84
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "CA",
"latency_ms": 134,
"timestamp": "2026-01-05T03:53:00Z",
"transaction_amount_usd": 3.74
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"g... | {
"exposure_vector": "rapid_burst",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.441,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 8",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1082131.57,
"financial_exposure_usd": 2227695.09,
"recoverable_pct": 0.497
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-105241",
"label": "fraudulent",
"label_confidence": 0.719,
"severity": "medium",
"timestamp": "2026-01-04T15:21:00Z",
"trace_id": "dba7ef5f-11f6-caaa-b996-dbfe64ad6bb2"
} | {
"account_age_days": 758,
"account_id": "ACCT-3B9909383E5D",
"baseline_risk_score": 0.273,
"kyc_tier": "tier_3",
"session_entropy": 0.174
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED",
"geo_country": "KY",
"latency_ms": 102,
"timestamp": "2026-01-04T15:21:00Z",
"transaction_amount_usd": 1106773.25
},
{
"asset": "JPY",
"burst_indicator": false,
"event_name": "ORDER_BOOK... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.803,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 2, geo diversity 6",
"confidence_band": "low",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 AND pos... | {
"customer_funds_at_risk_usd": 2448655.67,
"financial_exposure_usd": 2888349.68,
"recoverable_pct": 0.785
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-109586",
"label": "benign",
"label_confidence": 0.638,
"severity": "low",
"timestamp": "2026-01-07T15:46:00Z",
"trace_id": "eef304d7-b641-97f0-d632-32a04fd12ee9"
} | {
"account_age_days": 124,
"account_id": "ACCT-7EDEAC4A63B3",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.874
} | [
{
"asset": "USDC",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 372,
"timestamp": "2026-01-07T11:23:00Z",
"transaction_amount_usd": 8.38
},
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.686,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 8",
"confidence_band": "high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND prior_... | {
"customer_funds_at_risk_usd": 1480.75,
"financial_exposure_usd": 1645.25,
"recoverable_pct": 0.82
} | {
"chaos_profile": "Market_Stress_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-104983",
"label": "fraudulent",
"label_confidence": 0.801,
"severity": "critical",
"timestamp": "2026-01-04T11:03:00Z",
"trace_id": "58009e72-eb93-ceb2-2da8-94449ff86f93"
} | {
"account_age_days": 1121,
"account_id": "ACCT-432894F0D654",
"baseline_risk_score": 0.063,
"kyc_tier": "tier_2",
"session_entropy": 0.339
} | [
{
"asset": "SOL",
"burst_indicator": false,
"event_name": "DORMANT_CHECKIN",
"geo_country": "RU",
"latency_ms": 226,
"timestamp": "2026-01-04T08:02:00Z",
"transaction_amount_usd": 21.43
},
{
"asset": "BTC",
"burst_indicator": false,
"event_name": "LARGE_LIMIT_ORDER_POSTED... | {
"exposure_vector": "credential_abuse",
"fraud_class": "Market_Manipulation_Spoofing",
"scenario_description": "Large-quantity limit orders posted to move price, then cancelled after opposite-side execution."
} | {
"anomaly_score": 0.362,
"anomaly_type": "cancel_burst_with_opposite_fill",
"baseline_deviation": "market_manipulation_spoofing: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM orders WHERE cancel_ratio_5min > 0.85 AND opposite_side_fills_5min > 0 A... | {
"customer_funds_at_risk_usd": 1514506.71,
"financial_exposure_usd": 2586008.09,
"recoverable_pct": 0.922
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-108213",
"label": "benign",
"label_confidence": 0.559,
"severity": "low",
"timestamp": "2026-01-06T16:53:00Z",
"trace_id": "4e62987e-73cf-8b62-be0a-4e259bf35a1a"
} | {
"account_age_days": 364,
"account_id": "ACCT-36E43F6E043E",
"baseline_risk_score": 0.05,
"kyc_tier": "tier_3",
"session_entropy": 0.721
} | [
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "LOGIN_NEW_COUNTRY",
"geo_country": "FR",
"latency_ms": 402,
"timestamp": "2026-01-06T16:53:00Z",
"transaction_amount_usd": 11208.23
},
{
"asset": "EUR",
"burst_indicator": false,
"event_name": "KYC_REVIEW_FLAG",
... | {
"exposure_vector": "benign_travel_pattern",
"fraud_class": "Legitimate_High_Risk_Activity",
"scenario_description": "Legitimate high-risk pattern (travel + large transactions) that resembles fraud but is benign."
} | {
"anomaly_score": 0.647,
"anomaly_type": "geo_travel_with_elevated_spend",
"baseline_deviation": "false_positive_high_risk: burst count 2, geo diversity 6",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE new_country_last_24h = TRUE AND txn_sum_last_24h > 5000 AND p... | {
"customer_funds_at_risk_usd": 2054.09,
"financial_exposure_usd": 2913.18,
"recoverable_pct": 0.846
} | {
"chaos_profile": "Geo_Travel_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "benign",
"synthetic": true
} |
1.0.0-dark-pool-sample | {
"id": "DARKPOOL-101306",
"label": "fraudulent",
"label_confidence": 0.823,
"severity": "high",
"timestamp": "2026-01-01T21:46:00Z",
"trace_id": "1136d7a8-154e-e5da-7b1d-374f28c45f83"
} | {
"account_age_days": 677,
"account_id": "ACCT-BFA030E13C6E",
"baseline_risk_score": 0.63,
"kyc_tier": "tier_1",
"session_entropy": 0.874
} | [
{
"asset": "USDT",
"burst_indicator": false,
"event_name": "LOGIN_NEW_DEVICE",
"geo_country": "RU",
"latency_ms": 157,
"timestamp": "2026-01-01T21:46:00Z",
"transaction_amount_usd": 94608.36
},
{
"asset": "ETH",
"burst_indicator": false,
"event_name": "PASSWORD_CHANGE",
... | {
"exposure_vector": "order_book_spoof",
"fraud_class": "Account_Takeover_Sequence",
"scenario_description": "Credential changes followed by rapid fund extraction from the account."
} | {
"anomaly_score": 0.651,
"anomaly_type": "temporal_burst_sequence",
"baseline_deviation": "account_takeover: burst count 3, geo diversity 7",
"confidence_band": "very_high",
"detection_logic": "SELECT account_id FROM telemetry WHERE credential_changes_1h >= 2 AND withdrawal_sum_1h > 10000 GROUP BY account_id... | {
"customer_funds_at_risk_usd": 347327.19,
"financial_exposure_usd": 854078.37,
"recoverable_pct": 0.832
} | {
"chaos_profile": "Temporal_Burst_Mode",
"engine": "dark_pool_sim_v1",
"ground_truth_classification": "fraudulent",
"synthetic": true
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.